Could there be a legitimate reason for a SSH server to allow null authentication, to anyone?

I recently recalled a memory of when I had once, a fair while ago, accidentally tried to login to the wrong (mistyped) SSH server, and it allowed me access without the correct credentials: null authentication.
I thought nothing of it at th… Continue reading Could there be a legitimate reason for a SSH server to allow null authentication, to anyone?

Posted in ssh

What stops malicious code spoofing a Ctrl+Alt+Del login form by allowing only part of the phrase?

According to this answer from a question:

when you press Ctrl+Alt+Del, you can be sure that you’re typing your password in the real login form and not some other fake process trying to steal your password.

But let’s say an attacker clone… Continue reading What stops malicious code spoofing a Ctrl+Alt+Del login form by allowing only part of the phrase?

How often should a WPA2-Enterprise PMK be rekeyed in a high security, large corporate network? [closed]

The Pairwise-Master-Key (PMK) is the foundation key of encrypted communication on nearly all WPA WiFi networks, including WPA2-Enterprise networks.
Typically, the PMK rekey interval for personal networks is around 2-3 hours.
But how often … Continue reading How often should a WPA2-Enterprise PMK be rekeyed in a high security, large corporate network? [closed]

How can a WPA2-PSK network allow a user to connect without storing the key on their device at all?

On several occasions, I’ve been connected to a WPA2-PSK network, but where the key isn’t stored on my device at all.
But since you don’t need to re-enter it every time you re-connect, how is a user allowed to connect?

Continue reading How can a WPA2-PSK network allow a user to connect without storing the key on their device at all?

Why aren’t persistence cookies locally stored in an encrypted state?

As far as I’m aware, persistence cookies are only encrypted in transit (HTTPS), but aren’t inherently encrypted while being stored locally on the user’s device.
Assuming a certain persistence cookie can be used to fully authenticate login,… Continue reading Why aren’t persistence cookies locally stored in an encrypted state?

Is the Private Access Token itself the only thing needed to authenticate a service?

Private Access Tokens (PATs) are Apple-exclusive tokens that have many “password replacement” uses, such as automatically authenticating CloudFare’s Captchas.
Another example is GitHub account authentication.
But is the actual token itself… Continue reading Is the Private Access Token itself the only thing needed to authenticate a service?